Jump to content

Why same 14 detected objects on every scan via Heuristic Analysis


Recommended Posts

I have installed Malwarebytes Anti-Malware 2.0.2.1012. On every Threat Scan while it is scanning, only while doing Heuristic Analysis the same 14 threats are listed over-and-over which I quarantine. Where is the problem? Why the 14 threats getting repeated? The logfile is detailed below:

 

<?xml version="1.0" encoding="UTF-16" ?>
<mbam-log>
<header>
<date>2014/09/14 20:16:32 +0530</date>
<logfile>mbam-log-2014-09-14 (20-16-32).xml</logfile>
<isadmin>yes</isadmin>
</header>
<engine>
<version>2.00.2.1012</version>
<malware-database>v2014.09.10.09</malware-database>
<rootkit-database>v2014.09.10.02</rootkit-database>
<license>free</license>
<file-protection>disabled</file-protection>
<web-protection>disabled</web-protection>
<self-protection>disabled</self-protection>
</engine>
<system>
<osversion>Windows 7</osversion>
<arch>x86</arch>
<username>Bozo</username>
<filesys>NTFS</filesys>
</system>
<summary>
<type>threat</type>
<result>completed</result>
<objects>309982</objects>
<time>331</time>
<processes>0</processes>
<modules>0</modules>
<keys>14</keys>
<values>0</values>
<datas>0</datas>
<folders>0</folders>
<files>0</files>
<sectors>0</sectors>
</summary>
<options>
<memory>enabled</memory>
<startup>enabled</startup>
<filesystem>enabled</filesystem>
<archives>enabled</archives>
<rootkits>enabled</rootkits>
<deeprootkit>disabled</deeprootkit>
<heuristics>enabled</heuristics>
<pup>enabled</pup>
<pum>enabled</pum>
</options>
<items>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe</path><vendor>Security.Hijack</vendor><action>success</action><hash>58a810dc601bce68e216232f3ac9d52b</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\antiviruspro_2010.exe</path><vendor>Security.Hijack</vendor><action>success</action><hash>b14f9f4d9ae1df57743f02a8788b32ce</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bprotect.exe</path><vendor>PUP.Optional.IFEO.A</vendor><action>success</action><hash>31cfdc104635ca6ca5509dc7be467e82</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\empty.jpg</path><vendor>Security.Hijack</vendor><action>success</action><hash>06fae705a4d743f31db0606d04fffb05</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HACKER.COM.CN.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>f60a1ad2f58691a54fb2d2dba261d42c</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MICROSOFT.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>9d63f3f9bebdb87efe11a806d82bb44c</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSA.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>000029c3f08bcf67f8352886f211936d</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NEW FOLDER.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>7d83f0fc304b1d198304f9b52fd4fa06</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SMSS32.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>c33d6686007b7db91911d3ddb44f43bd</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCH0ST.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>09f76b819cdf1c1aacb6bef243c07c84</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCHOSTS.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>09f7c725b7c482b492d1189805fe817f</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VCLEANER.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>0af600ecdc9f65d120e7555c6a995ba5</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE</path><vendor>PUP.Optional.IFEO.A</vendor><action>success</action><hash>d42ca7452358c96d19ef2a3bc83c31cf</hash></key>
<key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE</path><vendor>PUP.Optional.IFEO.A</vendor><action>success</action><hash>e41c83695a21261046c3a1c4699bca36</hash></key>
</items>
</mbam-log>
 

Link to post
Share on other sites

Hello and :welcome:

 

Can you post your log in text format as we can not read it in xml format...

 

That being said, Being that you are probably infected, feel free to follow the instructions below to receive free, one-on-one expert assistance in checking your system and clearing out any infections and correcting any damage done by the malware.

Please see the following pinned topic which has information on how to get help with this: Available Assistance for Possibly Infected Computers

Thank you

Link to post
Share on other sites

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 16-09-2014
Scan Time: 08:18:07
Logfile: protection-log-2014-09-16.txt
Administrator: Yes

Version: 2.00.2.1012
Malware Database: v2014.09.14.09
Rootkit Database: v2014.09.13.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7
CPU: x86
File System: NTFS
User: Bozo

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 310928
Time Elapsed: 5 min, 21 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 14
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe, , [0823effe3f3ca5911d767add946f43bd],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\antiviruspro_2010.exe, , [2cff89644833241295b9456a33d0d030],
PUP.Optional.IFEO.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bprotect.exe, , [67c443aa19623303721e006948bc1de3],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\empty.jpg, , [1d0e54990f6cc86e89df00d28c77a35d],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HACKER.COM.CN.EXE, , [64c76a83c0bb2c0aebb17f329f64bd43],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MICROSOFT.EXE, , [e94238b5fb8081b5fcae842eb3505ba5],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSA.EXE, , [9e8ddd10b3c8f046eade41718083e818],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NEW FOLDER.EXE, , [8ba0e9042f4c5cdaf72bdcd77c87fc04],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SMSS32.EXE, , [df4cf6f73546e056aa1b5361867dea16],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCH0ST.EXE, , [5ccf88651962df5719e44b6922e147b9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCHOSTS.EXE, , [f338f5f8e794ab8b15e9951f15ee28d8],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VCLEANER.EXE, , [4ae16786354637ffdcc66d4801025aa6],
PUP.Optional.IFEO.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE, , [af7ce706bbc02c0a6d36de8bd034738d],
PUP.Optional.IFEO.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE, , [60cb27c6d1aa2c0a267eda8fda2a23dd],

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

Link to post
Share on other sites

Hi:

 

Thanks for the log.

 

If you'd like some help with cleaning up the system, please follow @Firefox's original advice: :)

 

 
That being said, Being that you are probably infected, feel free to follow the instructions below to receive free, one-on-one expert assistance in checking your system and clearing out any infections and correcting any damage done by the malware.

Please see the following pinned topic which has information on how to get help with this: Available Assistance for Possibly Infected Computers

Thank you

 

Thank you,

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.